Previous Issue
Volume 4, September
 
 

Signals, Volume 4, Issue 4 (December 2023) – 12 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Select all
Export citation of selected articles as:
23 pages, 10816 KiB  
Article
Integrating Data from Multiple Nondestructive Evaluation Technologies Using Machine Learning Algorithms for the Enhanced Assessment of a Concrete Bridge Deck
Signals 2023, 4(4), 836-858; https://doi.org/10.3390/signals4040046 - 04 Dec 2023
Viewed by 101
Abstract
Several factors impact the durability of concrete bridge decks, including traffic loads, fatigue, temperature changes, environmental stress, and maintenance activities. Detecting problems such as corrosion, delamination, or concrete degradation early on can lower maintenance costs. Nondestructive evaluation (NDE) techniques can detect these issues [...] Read more.
Several factors impact the durability of concrete bridge decks, including traffic loads, fatigue, temperature changes, environmental stress, and maintenance activities. Detecting problems such as corrosion, delamination, or concrete degradation early on can lower maintenance costs. Nondestructive evaluation (NDE) techniques can detect these issues at early stages. Each NDE method, meanwhile, has limitations that reduce the accuracy of the assessment. In this study, multiple NDE technologies were combined with machine learning algorithms to improve the interpretation of half-cell potential (HCP) and electrical resistivity (ER) measurements. A parametric study was performed to analyze the influence of five parameters on HCP and ER measurements, such as the degree of saturation, corrosion length, delamination depth, concrete cover, and moisture condition of delamination. The results were obtained through finite element simulations and used to build two machine learning algorithms, a classification algorithm and a regression algorithm, based on Random Forest methodology. The algorithms were tested using data collected from a bridge deck in the BEAST® facility. Both machine learning algorithms were effective in improving the interpretation of the ER and HCP measurements using data from multiple NDE technologies. Full article
Show Figures

Figure 1

20 pages, 6552 KiB  
Article
EEG-Based Seizure Detection Using Variable-Frequency Complex Demodulation and Convolutional Neural Networks
Signals 2023, 4(4), 816-835; https://doi.org/10.3390/signals4040045 - 28 Nov 2023
Viewed by 272
Abstract
Epilepsy is a complex neurological disorder characterized by recurrent and unpredictable seizures that affect millions of people around the world. Early and accurate epilepsy detection is critical for timely medical intervention and improved patient outcomes. Several methods and classifiers for automated epilepsy detection [...] Read more.
Epilepsy is a complex neurological disorder characterized by recurrent and unpredictable seizures that affect millions of people around the world. Early and accurate epilepsy detection is critical for timely medical intervention and improved patient outcomes. Several methods and classifiers for automated epilepsy detection have been developed in previous research. However, the existing research landscape requires innovative approaches that can further improve the accuracy of diagnosing and managing patients. This study investigates the application of variable-frequency complex demodulation (VFCDM) and convolutional neural networks (CNN) to discriminate between healthy, interictal, and ictal states using electroencephalogram (EEG) data. For testing this approach, the EEG signals were collected from the publicly available Bonn dataset. A high-resolution time–frequency spectrum (TFS) of each EEG signal was obtained using the VFCDM. The TFS images were fed to the CNN classifier for the classification of the signals. The performance of CNN was evaluated using leave-one-subject-out cross-validation (LOSO CV). The TFS shows variations in its frequency for different states that correspond to variation in the neural activity. The LOSO CV approach yields a consistently high performance, ranging from 90% to 99% between different combinations of healthy and epilepsy states (interictal and ictal). The extensive LOSO CV validation approach ensures the reliability and robustness of the proposed method. As a result, the research contributes to advancing the field of epilepsy detection and brings us one step closer to developing practical, reliable, and efficient diagnostic tools for clinical applications. Full article
(This article belongs to the Special Issue Advanced Methods of Biomedical Signal Processing)
Show Figures

Figure 1

16 pages, 3538 KiB  
Article
Nearly Linear-Phase 2-D Recursive Digital Filters Design Using Balanced Realization Model Reduction
Signals 2023, 4(4), 800-815; https://doi.org/10.3390/signals4040044 - 27 Nov 2023
Viewed by 205
Abstract
This paper presents a new method for the design of separable-denominator 2-D IIR filters with nearly linear phase in the passband. The design method is based on a balanced realization model reduction technique. The nearly linear-phase 2-D IIR filter is designed using 2-D [...] Read more.
This paper presents a new method for the design of separable-denominator 2-D IIR filters with nearly linear phase in the passband. The design method is based on a balanced realization model reduction technique. The nearly linear-phase 2-D IIR filter is designed using 2-D model reduction from a linear-phase 2-D FIR filter, which serves as the initial filter. The structured controllability and observability Gramians Ps and Qs serve as the foundation for this technique. onal positive-definite matrices that satisfy 2-D Lyapunov equations. An efficient method is used to compute these Gramians by minimizing the traces of Ps and Qs under linear matrix inequality (LMI) constraints. The use of these Gramians ensures that the resulting 2-D IIR filter preserves stability and can be implemented using a separable-denominator 2-D filter with fewer coefficients than the original 2-D FIR filter. Numerical examples show that the proposed method compares favorably with existing techniques. Full article
(This article belongs to the Topic Research on the Application of Digital Signal Processing)
Show Figures

Figure 1

12 pages, 1236 KiB  
Technical Note
Evaluating the Feasibility of Euler Angles for Bed-Based Patient Movement Monitoring
Signals 2023, 4(4), 788-799; https://doi.org/10.3390/signals4040043 - 14 Nov 2023
Viewed by 303
Abstract
In the field of modern healthcare, technology plays a crucial role in improving patient care and ensuring their safety. One area where advancements can still be made is in alert systems, which provide timely notifications to hospital staff about critical events involving patients. [...] Read more.
In the field of modern healthcare, technology plays a crucial role in improving patient care and ensuring their safety. One area where advancements can still be made is in alert systems, which provide timely notifications to hospital staff about critical events involving patients. These early warning systems allow for swift responses and appropriate interventions when needed. A commonly used patient alert technology is nurse call systems, which empower patients to request assistance using bedside devices. Over time, these systems have evolved to include features such as call prioritization, integration with staff communication tools, and links to patient monitoring setups that can generate alerts based on vital signs. There is currently a shortage of smart systems that use sensors to inform healthcare workers about the activity levels of patients who are confined to their beds. Current systems mainly focus on alerting staff when patients become disconnected from monitoring machines. In this technical note, we discuss the potential of utilizing cost-effective sensors to monitor and evaluate typical movements made by hospitalized bed-bound patients. To improve the care provided to unaware patients further, healthcare professionals could benefit from implementing trigger alert systems that are based on detecting patient movements. Such systems would promptly notify mobile devices or nursing stations whenever a patient displays restlessness or leaves their bed urgently and requires medical attention. Full article
(This article belongs to the Special Issue Advanced Methods of Biomedical Signal Processing)
Show Figures

Figure 1

20 pages, 686 KiB  
Article
High-Quality and Reproducible Automatic Drum Transcription from Crowdsourced Data
Signals 2023, 4(4), 768-787; https://doi.org/10.3390/signals4040042 - 10 Nov 2023
Viewed by 362
Abstract
Within the broad problem known as automatic music transcription, we considered the specific task of automatic drum transcription (ADT). This is a complex task that has recently shown significant advances thanks to deep learning (DL) techniques. Most notably, massive amounts of labeled data [...] Read more.
Within the broad problem known as automatic music transcription, we considered the specific task of automatic drum transcription (ADT). This is a complex task that has recently shown significant advances thanks to deep learning (DL) techniques. Most notably, massive amounts of labeled data obtained from crowds of annotators have made it possible to implement large-scale supervised learning architectures for ADT. In this study, we explored the untapped potential of these new datasets by addressing three key points: First, we reviewed recent trends in DL architectures and focused on two techniques, self-attention mechanisms and tatum-synchronous convolutions. Then, to mitigate the noise and bias that are inherent in crowdsourced data, we extended the training data with additional annotations. Finally, to quantify the potential of the data, we compared many training scenarios by combining up to six different datasets, including zero-shot evaluations. Our findings revealed that crowdsourced datasets outperform previously utilized datasets, and regardless of the DL architecture employed, they are sufficient in size and quality to train accurate models. By fully exploiting this data source, our models produced high-quality drum transcriptions, achieving state-of-the-art results. Thanks to this accuracy, our work can be more successfully used by musicians (e.g., to learn new musical pieces by reading, or to convert their performances to MIDI) and researchers in music information retrieval (e.g., to retrieve information from the notes instead of audio, such as the rhythm or structure of a piece). Full article
(This article belongs to the Topic Research on the Application of Digital Signal Processing)
Show Figures

Figure 1

22 pages, 3715 KiB  
Article
Radix-22 Algorithm for the Odd New Mersenne Number Transform (ONMNT)
Signals 2023, 4(4), 746-767; https://doi.org/10.3390/signals4040041 - 23 Oct 2023
Viewed by 492
Abstract
This paper introduces a new derivation of the radix-22 fast algorithm for the forward odd new Mersenne number transform (ONMNT) and the inverse odd new Mersenne number transform (IONMNT). This involves introducing new equations and functions in finite fields, bringing particular [...] Read more.
This paper introduces a new derivation of the radix-22 fast algorithm for the forward odd new Mersenne number transform (ONMNT) and the inverse odd new Mersenne number transform (IONMNT). This involves introducing new equations and functions in finite fields, bringing particular challenges unlike those in other fields. The radix-22 algorithm combines the benefits of the reduced number of operations of the radix-4 algorithm and the simple butterfly structure of the radix-2 algorithm, making it suitable for various applications such as lightweight ciphers, authenticated encryption, hash functions, signal processing, and convolution calculations. The multidimensional linear index mapping technique is the conventional method used to derive the radix-22 algorithm. However, this method does not provide clear insights into the underlying structure and flexibility of the radix-22 approach. This paper addresses this limitation and proposes a derivation based on bit-unscrambling techniques, which reverse the ordering of the output sequence, resulting in efficient calculations with fewer operations. Butterfly and signal flow diagrams are also presented to illustrate the structure of the fast algorithm for both ONMNT and IONMNT. The proposed method should pave the way for efficient and flexible implementation of ONMNT and IONMNT in applications such as lightweight ciphers and signal processing. The algorithm has been implemented in C and is validated with an example. Full article
Show Figures

Figure 1

21 pages, 1191 KiB  
Article
Restoration for Intensity Nonuniformities with Discontinuities in Whole-Body MRI
Signals 2023, 4(4), 725-745; https://doi.org/10.3390/signals4040040 - 18 Oct 2023
Viewed by 741
Abstract
The reconstruction in MRI assumes a uniform radio-frequency field. However, this is violated due to coil field nonuniformity and sensitivity variations. In whole-body MRI, the nonuniformities are more complex due to the imaging with multiple coils that typically have different overall sensitivities that [...] Read more.
The reconstruction in MRI assumes a uniform radio-frequency field. However, this is violated due to coil field nonuniformity and sensitivity variations. In whole-body MRI, the nonuniformities are more complex due to the imaging with multiple coils that typically have different overall sensitivities that result in sharp sensitivity changes at the junctions between adjacent coils. These lead to images with anatomically inconsequential intensity nonuniformities that include jump discontinuities of the intensity nonuniformities at the junctions corresponding to adjacent coils. The body is also imaged with multiple contrasts that result in images with different nonuniformities. A method is presented for the joint intensity uniformity restoration of two such images to achieve intensity homogenization. The effect of the spatial intensity distortion on the auto-co-occurrence statistics of each image as well as on the joint-co-occurrence statistics of the two images is modeled in terms of Point Spread Function (PSF). The PSFs and the non-stationary deconvolution of these PSFs from the statistics offer posterior Bayesian expectation estimates of the nonuniformity with Bayesian coring. Subsequently, a piecewise smoothness constraint is imposed for nonuniformity. This uses non-isotropic smoothing of the restoration field to allow the modeling of junction discontinuities. The implementation of the restoration method is iterative and imposes stability and validity constraints of the nonuniformity estimates. The effectiveness and accuracy of the method is demonstrated extensively with whole-body MRI image pairs of thirty-one cancer patients. Full article
Show Figures

Figure 1

17 pages, 6326 KiB  
Article
Quantitative Electroencephalography: Cortical Responses under Different Postural Conditions
Signals 2023, 4(4), 708-724; https://doi.org/10.3390/signals4040039 - 18 Oct 2023
Viewed by 406
Abstract
In this study, the alpha and beta spectral frequency bands and amplitudes of EEG signals recorded from 10 healthy volunteers using an experimental cap with neoprene jacketed electrodes were analysed. Background: One of the main limitations in the analysis of EEG signals during [...] Read more.
In this study, the alpha and beta spectral frequency bands and amplitudes of EEG signals recorded from 10 healthy volunteers using an experimental cap with neoprene jacketed electrodes were analysed. Background: One of the main limitations in the analysis of EEG signals during movement is the presence of artefacts due to cranial muscle contraction; the objectives of this study therefore focused on two main aspects: (1) validating a tool capable of decreasing movement artefacts, while developing a reliable method for the quantitative analysis of EEG data; (2) using this method to analyse the EEG signal recorded during a particular motor activity (bi- and monopodalic postural control). Methods: The EEG sampling frequency was 512 Hz; the signal was acquired on 16 channels with monopolar montage and the reference on Cz. The recorded signals were processed using a specifically written Matlab script and also by exploiting open-source software (Eeglab). Results: The procedure used showed excellent reliability, allowing for a significant decrease in movement artefacts even during motor tasks performed both with eyes open and with eyes closed. Conclusions: This preliminary study lays the foundation for correctly recording EEG signals as an additional source of information in the study of human movement. Full article
(This article belongs to the Special Issue Advancing Signal Processing and Analytics of EEG Signals)
Show Figures

Figure 1

21 pages, 11269 KiB  
Review
Exploitation Techniques of IoST Vulnerabilities in Air-Gapped Networks and Security Measures—A Systematic Review
Signals 2023, 4(4), 687-707; https://doi.org/10.3390/signals4040038 - 13 Oct 2023
Viewed by 597
Abstract
IP cameras and digital video recorders, as part of the Internet of Surveillance Things (IoST) technology, can sometimes allow unauthenticated access to the video feed or management dashboard. These vulnerabilities may result from weak APIs, misconfigurations, or hidden firmware backdoors. What is particularly [...] Read more.
IP cameras and digital video recorders, as part of the Internet of Surveillance Things (IoST) technology, can sometimes allow unauthenticated access to the video feed or management dashboard. These vulnerabilities may result from weak APIs, misconfigurations, or hidden firmware backdoors. What is particularly concerning is that these vulnerabilities can stay unnoticed for extended periods, spanning weeks, months, or even years, until a malicious attacker decides to exploit them. The response actions in case of identifying the vulnerability, such as updating software and firmware for millions of IoST devices, might be challenging and time-consuming. Implementing an air-gapped video surveillance network, which is isolated from the internet and external access, can reduce the cybersecurity threats associated with internet-connected IoST devices. However, such networks can also be susceptible to other threats and attacks, which need to be explored and analyzed. In this work, we perform a systematic literature review on the current state of research and use cases related to compromising and protecting cameras in logical and physical air-gapped networks. We provide a network diagram for each mode of exploitation, discuss the vulnerabilities that could result in a successful attack, demonstrate the potential impacts on organizations in the event of IoST compromise, and outline the security measures and mechanisms that can be deployed to mitigate these security risks. Full article
(This article belongs to the Special Issue Internet of Things for Smart Planet: Present and Future)
Show Figures

Figure 1

18 pages, 8959 KiB  
Article
Beyond Staircasing Effect: Robust Image Smoothing via 0 Gradient Minimization and Novel Gradient Constraints
Signals 2023, 4(4), 669-686; https://doi.org/10.3390/signals4040037 - 26 Sep 2023
Viewed by 377
Abstract
In this paper, we propose robust image-smoothing methods based on 0 gradient minimization with novel gradient constraints to effectively suppress pseudo-edges. Simultaneously minimizing the 0 gradient, i.e., the number of nonzero gradients in an image, and the 2 data fidelity [...] Read more.
In this paper, we propose robust image-smoothing methods based on 0 gradient minimization with novel gradient constraints to effectively suppress pseudo-edges. Simultaneously minimizing the 0 gradient, i.e., the number of nonzero gradients in an image, and the 2 data fidelity results in a smooth image. However, this optimization often leads to undesirable artifacts, such as pseudo-edges, known as the “staircasing effect”, and halos, which become more visible in image enhancement tasks, like detail enhancement and tone mapping. To address these issues, we introduce two types of gradient constraints: box and ball. These constraints are applied using a reference image (e.g., the input image is used as a reference for image smoothing) to suppress pseudo-edges in homogeneous regions and the blurring effect around strong edges. We also present an 0 gradient minimization problem based on the box-/ball-type gradient constraints using an alternating direction method of multipliers (ADMM). Experimental results on important applications of 0 gradient minimization demonstrate the advantages of our proposed methods compared to existing 0 gradient-based approaches. Full article
(This article belongs to the Topic Research on the Application of Digital Signal Processing)
Show Figures

Figure 1

18 pages, 2589 KiB  
Article
Improved RSSI Indoor Localization in IoT Systems with Machine Learning Algorithms
Signals 2023, 4(4), 651-668; https://doi.org/10.3390/signals4040036 - 25 Sep 2023
Viewed by 591
Abstract
Recent developments in machine learning algorithms are playing a significant role in wireless communication and Internet of Things (IoT) systems. Location-based Internet of Things services (LBIoTS) are considered one of the primary applications among those IoT applications. The key information involved in LBIoTS [...] Read more.
Recent developments in machine learning algorithms are playing a significant role in wireless communication and Internet of Things (IoT) systems. Location-based Internet of Things services (LBIoTS) are considered one of the primary applications among those IoT applications. The key information involved in LBIoTS is finding an object’s geographical location. The Global Positioning System (GPS) technique does not perform better in indoor environments due to multipath. Numerous methods have been investigated for indoor localization scenarios. However, the precise location estimation of a moving object in such an application is challenging due to the high signal fluctuations. Therefore, this paper presents machine learning algorithms to estimate the object’s location based on the Received Signal Strength Indicator (RSSI) values collected through Bluetooth low-energy (BLE)-based nodes. In this experiment, we utilize a publicly available RSSI dataset. The RSSI data are collected from different BLE ibeacon nodes installed in a complex indoor environment with labels. Then, the RSSI data are linearized using the weighted least-squares method and filtered using moving average filters. Moreover, machine learning algorithms are used for training and testing the dataset to estimate the precise location of the objects. All the proposed algorithms were tested and evaluated under their different hyperparameters. The tested models provided approximately 85% accuracy for KNN, 84% for SVM and 76% accuracy in FFNN. Full article
Show Figures

Figure 1

7 pages, 3207 KiB  
Communication
Localizing the First Interstellar Meteor with Seismometer Data
Signals 2023, 4(4), 644-650; https://doi.org/10.3390/signals4040035 - 25 Sep 2023
Viewed by 442
Abstract
The first meter-scale interstellar meteor (IM1) was detected by US government sensors in 2014, identified as an interstellar object candidate in 2019, and confirmed by the Department of Defense (DoD) in 2022. We use data from a nearby seismometer to localize the fireball [...] Read more.
The first meter-scale interstellar meteor (IM1) was detected by US government sensors in 2014, identified as an interstellar object candidate in 2019, and confirmed by the Department of Defense (DoD) in 2022. We use data from a nearby seismometer to localize the fireball to a ∼16km2 region within the ∼120km2 zone allowed by the precision of the DoD-provided coordinates. The improved localization is of great importance for a forthcoming expedition to retrieve the meteor fragments. Full article
(This article belongs to the Special Issue Enabling a More Prosperous Space Era: A Signal Processing Perspective)
Show Figures

Figure 1

Previous Issue
Back to TopTop